Resubmissions

15-12-2024 23:44

241215-3rewbasqew 10

15-12-2024 21:58

241215-1vf7fazrcl 10

Analysis

  • max time kernel
    91s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    15-12-2024 21:58

General

  • Target

    file.exe

  • Size

    2.9MB

  • MD5

    f45da90410f7d099ab3bd1589a039a79

  • SHA1

    a7effa8c1fc9b88eea3498ed50011d7a14a7e617

  • SHA256

    4fb84272045fc39952401061f10a2ba439d2f2a7c6e30f2448b757caf731df19

  • SHA512

    577ae3d2c9f46c57ba71a9437fdf47deac865605b31f0a0a2a2caef90a4346bfa12c0894fe9c3a8dc7a602516bde33d58d483a8c5547452397f15a824c07a864

  • SSDEEP

    49152:LcjBVZDZYhTklsZHUwGemMSwvMGKuFk2PGHqv:aBVZD+NklXwG5Mf73eTHqv

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

lumma

C2

https://impend-differ.biz/api

https://print-vexer.biz/api

https://dare-curbys.biz/api

https://covery-mover.biz/api

https://formy-spill.biz/api

https://dwell-exclaim.biz/api

https://zinc-sneark.biz/api

https://se-blurry.biz/api

https://drive-connect.cyou/api

https://sordid-snaked.cyou/api

https://awake-weaves.cyou/api

https://wrathful-jammy.cyou/api

https://debonairnukk.xyz/api

https://diffuculttan.xyz/api

https://effecterectz.xyz/api

https://deafeninggeh.biz/api

https://immureprech.biz/api

https://shineugler.biz/api

Extracted

Family

cryptbot

Extracted

Family

lumma

C2

https://drive-connect.cyou/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • CryptBot

    CryptBot is a C++ stealer distributed widely in bundle with other software.

  • Cryptbot family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 6 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 12 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Drops startup file 3 IoCs
  • Executes dropped EXE 57 IoCs
  • Identifies Wine through registry keys 2 TTPs 6 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 64 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 15 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Views/modifies file attributes 1 TTPs 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2520
    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2704
      • C:\Users\Admin\AppData\Local\Temp\1015564001\ShtrayEasy35.exe
        "C:\Users\Admin\AppData\Local\Temp\1015564001\ShtrayEasy35.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2300
        • C:\Users\Admin\AppData\Local\Temp\zgr3xA3f\c5e6IAk1YYC622ma.exe
          C:\Users\Admin\AppData\Local\Temp\zgr3xA3f\c5e6IAk1YYC622ma.exe 2300
          4⤵
          • Drops startup file
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:2836
        • C:\Users\Admin\AppData\Local\Temp\1015564001\vhVr86ldP8nozMj8.exe
          C:\Users\Admin\AppData\Local\Temp\1015564001\vhVr86ldP8nozMj8.exe 2300
          4⤵
          • Drops startup file
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:1844
        • C:\Users\Admin\AppData\Local\Temp\1015564001\kfRftPzvF6qnINJ5.exe
          C:\Users\Admin\AppData\Local\Temp\1015564001\kfRftPzvF6qnINJ5.exe 2300
          4⤵
          • Drops startup file
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:2120
        • C:\Users\Admin\AppData\Local\Temp\1015564001\hmBbyYiqCM2q0ebj.exe
          C:\Users\Admin\AppData\Local\Temp\1015564001\hmBbyYiqCM2q0ebj.exe 2300
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          PID:624
        • C:\Users\Admin\AppData\Local\Temp\1015564001\vSBjZWpz4nUm7UVJ.exe
          C:\Users\Admin\AppData\Local\Temp\1015564001\vSBjZWpz4nUm7UVJ.exe 2300
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          PID:1800
        • C:\Users\Admin\AppData\Local\Temp\1015564001\LDW2tcFgjRY2mKFS.exe
          C:\Users\Admin\AppData\Local\Temp\1015564001\LDW2tcFgjRY2mKFS.exe 2300
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          PID:2084
        • C:\Users\Admin\AppData\Local\Temp\1015564001\qxbq775G5qvDm5lc.exe
          C:\Users\Admin\AppData\Local\Temp\1015564001\qxbq775G5qvDm5lc.exe 2300
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          PID:700
        • C:\Users\Admin\AppData\Local\Temp\1015564001\BBnlFLaaqRdtB6N8.exe
          C:\Users\Admin\AppData\Local\Temp\1015564001\BBnlFLaaqRdtB6N8.exe 2300
          4⤵
          • Executes dropped EXE
          PID:1484
        • C:\Users\Admin\AppData\Local\Temp\1015564001\3JnPC5YdbTFoDSOs.exe
          C:\Users\Admin\AppData\Local\Temp\1015564001\3JnPC5YdbTFoDSOs.exe 2300
          4⤵
          • Executes dropped EXE
          PID:2052
        • C:\Users\Admin\AppData\Local\Temp\1015564001\fV1WAeEhVtOcXTfV.exe
          C:\Users\Admin\AppData\Local\Temp\1015564001\fV1WAeEhVtOcXTfV.exe 2300
          4⤵
          • Executes dropped EXE
          PID:1256
        • C:\Users\Admin\AppData\Local\Temp\1015564001\ZBplcaLXUbzfeahQ.exe
          C:\Users\Admin\AppData\Local\Temp\1015564001\ZBplcaLXUbzfeahQ.exe 2300
          4⤵
          • Executes dropped EXE
          PID:832
        • C:\Users\Admin\AppData\Local\Temp\1015564001\PBilPcCkJVAVm3QM.exe
          C:\Users\Admin\AppData\Local\Temp\1015564001\PBilPcCkJVAVm3QM.exe 2300
          4⤵
          • Executes dropped EXE
          PID:3028
        • C:\Users\Admin\AppData\Local\Temp\1015564001\2lwWp8foHX5kCwCy.exe
          C:\Users\Admin\AppData\Local\Temp\1015564001\2lwWp8foHX5kCwCy.exe 2300
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          PID:1524
        • C:\Users\Admin\AppData\Local\Temp\1015564001\GxGoSELtbIIy4VCb.exe
          C:\Users\Admin\AppData\Local\Temp\1015564001\GxGoSELtbIIy4VCb.exe 2300
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:2304
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2304 -s 208
            5⤵
            • Loads dropped DLL
            • Program crash
            PID:2328
        • C:\Users\Admin\AppData\Local\Temp\1015564001\5zr7lNyArZ1m8KAK.exe
          C:\Users\Admin\AppData\Local\Temp\1015564001\5zr7lNyArZ1m8KAK.exe 2300
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:1560
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1560 -s 208
            5⤵
            • Loads dropped DLL
            • Program crash
            PID:1140
        • C:\Users\Admin\AppData\Local\Temp\1015564001\FGX6OC7QoGeBMz3s.exe
          C:\Users\Admin\AppData\Local\Temp\1015564001\FGX6OC7QoGeBMz3s.exe 2300
          4⤵
          • Executes dropped EXE
          PID:2540
        • C:\Users\Admin\AppData\Local\Temp\1015564001\bOfraM05bQRLNEFb.exe
          C:\Users\Admin\AppData\Local\Temp\1015564001\bOfraM05bQRLNEFb.exe 2300
          4⤵
          • Executes dropped EXE
          PID:2364
        • C:\Users\Admin\AppData\Local\Temp\1015564001\cd11nXrZKXs92U8A.exe
          C:\Users\Admin\AppData\Local\Temp\1015564001\cd11nXrZKXs92U8A.exe 2300
          4⤵
          • Executes dropped EXE
          PID:2872
        • C:\Users\Admin\AppData\Local\Temp\1015564001\hecAqiNeBGDd9flg.exe
          C:\Users\Admin\AppData\Local\Temp\1015564001\hecAqiNeBGDd9flg.exe 2300
          4⤵
          • Executes dropped EXE
          PID:316
        • C:\Users\Admin\AppData\Local\Temp\1015564001\IOJmBDWVQd20lJah.exe
          C:\Users\Admin\AppData\Local\Temp\1015564001\IOJmBDWVQd20lJah.exe 2300
          4⤵
          • Executes dropped EXE
          PID:1896
        • C:\Users\Admin\AppData\Local\Temp\1015564001\Ss4z6OY36zAJlbzl.exe
          C:\Users\Admin\AppData\Local\Temp\1015564001\Ss4z6OY36zAJlbzl.exe 2300
          4⤵
          • Executes dropped EXE
          PID:1704
        • C:\Users\Admin\AppData\Local\Temp\1015564001\qMEX29bJmmBgiw5L.exe
          C:\Users\Admin\AppData\Local\Temp\1015564001\qMEX29bJmmBgiw5L.exe 2300
          4⤵
          • Executes dropped EXE
          PID:2024
        • C:\Users\Admin\AppData\Local\Temp\1015564001\Dnwlsl6ER5VKXLd4.exe
          C:\Users\Admin\AppData\Local\Temp\1015564001\Dnwlsl6ER5VKXLd4.exe 2300
          4⤵
          • Executes dropped EXE
          PID:408
        • C:\Users\Admin\AppData\Local\Temp\1015564001\qHJPLTaCPRUIUetf.exe
          C:\Users\Admin\AppData\Local\Temp\1015564001\qHJPLTaCPRUIUetf.exe 2300
          4⤵
          • Executes dropped EXE
          PID:1528
        • C:\Users\Admin\AppData\Local\Temp\1015564001\3ZTexTyHVnmq1bmg.exe
          C:\Users\Admin\AppData\Local\Temp\1015564001\3ZTexTyHVnmq1bmg.exe 2300
          4⤵
          • Executes dropped EXE
          PID:2664
        • C:\Users\Admin\AppData\Local\Temp\1015564001\4vyufNaRcmaJ057F.exe
          C:\Users\Admin\AppData\Local\Temp\1015564001\4vyufNaRcmaJ057F.exe 2300
          4⤵
          • Executes dropped EXE
          PID:2156
        • C:\Users\Admin\AppData\Local\Temp\1015564001\xlJoDOsleYTwQQj7.exe
          C:\Users\Admin\AppData\Local\Temp\1015564001\xlJoDOsleYTwQQj7.exe 2300
          4⤵
          • Executes dropped EXE
          PID:1836
        • C:\Users\Admin\AppData\Local\Temp\1015564001\iFnvNQ2sKlyT1DWY.exe
          C:\Users\Admin\AppData\Local\Temp\1015564001\iFnvNQ2sKlyT1DWY.exe 2300
          4⤵
          • Executes dropped EXE
          PID:2504
        • C:\Users\Admin\AppData\Local\Temp\1015564001\1K0U9pdfSBX8UXWW.exe
          C:\Users\Admin\AppData\Local\Temp\1015564001\1K0U9pdfSBX8UXWW.exe 2300
          4⤵
          • Executes dropped EXE
          PID:2384
        • C:\Users\Admin\AppData\Local\Temp\1015564001\gN0JWd2gNcTz8iZz.exe
          C:\Users\Admin\AppData\Local\Temp\1015564001\gN0JWd2gNcTz8iZz.exe 2300
          4⤵
          • Executes dropped EXE
          PID:2420
        • C:\Users\Admin\AppData\Local\Temp\1015564001\i4wRFC7oElpLq0z3.exe
          C:\Users\Admin\AppData\Local\Temp\1015564001\i4wRFC7oElpLq0z3.exe 2300
          4⤵
          • Executes dropped EXE
          PID:2440
        • C:\Users\Admin\AppData\Local\Temp\1015564001\EftcuEppJPcHM9wX.exe
          C:\Users\Admin\AppData\Local\Temp\1015564001\EftcuEppJPcHM9wX.exe 2300
          4⤵
          • Executes dropped EXE
          PID:1840
        • C:\Users\Admin\AppData\Local\Temp\1015564001\sLXcgNfpfWo33YcB.exe
          C:\Users\Admin\AppData\Local\Temp\1015564001\sLXcgNfpfWo33YcB.exe 2300
          4⤵
          • Executes dropped EXE
          PID:3148
        • C:\Users\Admin\AppData\Local\Temp\1015564001\rFwpYb6A4Kc3v6CZ.exe
          C:\Users\Admin\AppData\Local\Temp\1015564001\rFwpYb6A4Kc3v6CZ.exe 2300
          4⤵
          • Executes dropped EXE
          PID:3176
        • C:\Users\Admin\AppData\Local\Temp\1015564001\Td5y6ZnVvEU3cORl.exe
          C:\Users\Admin\AppData\Local\Temp\1015564001\Td5y6ZnVvEU3cORl.exe 2300
          4⤵
          • Executes dropped EXE
          PID:3280
        • C:\Users\Admin\AppData\Local\Temp\1015564001\rVa4FaBNNyfSy73S.exe
          C:\Users\Admin\AppData\Local\Temp\1015564001\rVa4FaBNNyfSy73S.exe 2300
          4⤵
          • Executes dropped EXE
          PID:3324
        • C:\Users\Admin\AppData\Local\Temp\1015564001\o37ltC79qr3QGnzT.exe
          C:\Users\Admin\AppData\Local\Temp\1015564001\o37ltC79qr3QGnzT.exe 2300
          4⤵
            PID:3628
          • C:\Users\Admin\AppData\Local\Temp\1015564001\PvjAQvJAbnLOF05E.exe
            C:\Users\Admin\AppData\Local\Temp\1015564001\PvjAQvJAbnLOF05E.exe 2300
            4⤵
              PID:3824
            • C:\Users\Admin\AppData\Local\Temp\1015564001\RdGEvkectNMuk8HV.exe
              C:\Users\Admin\AppData\Local\Temp\1015564001\RdGEvkectNMuk8HV.exe 2300
              4⤵
                PID:3852
              • C:\Users\Admin\AppData\Local\Temp\1015564001\cJdhy1M84rYdKU6P.exe
                C:\Users\Admin\AppData\Local\Temp\1015564001\cJdhy1M84rYdKU6P.exe 2300
                4⤵
                  PID:3952
                • C:\Users\Admin\AppData\Local\Temp\1015564001\XESM3rIY79Wdk9QV.exe
                  C:\Users\Admin\AppData\Local\Temp\1015564001\XESM3rIY79Wdk9QV.exe 2300
                  4⤵
                    PID:1932
                  • C:\Users\Admin\AppData\Local\Temp\1015564001\CxEBjZhCtJqMOclA.exe
                    C:\Users\Admin\AppData\Local\Temp\1015564001\CxEBjZhCtJqMOclA.exe 2300
                    4⤵
                      PID:5640
                    • C:\Users\Admin\AppData\Local\Temp\1015564001\rmfpvhZjHakolUpz.exe
                      C:\Users\Admin\AppData\Local\Temp\1015564001\rmfpvhZjHakolUpz.exe 2300
                      4⤵
                        PID:6408
                    • C:\Users\Admin\AppData\Local\Temp\1015665001\IQ7ux2z.exe
                      "C:\Users\Admin\AppData\Local\Temp\1015665001\IQ7ux2z.exe"
                      3⤵
                      • Executes dropped EXE
                      • System Location Discovery: System Language Discovery
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2480
                    • C:\Users\Admin\AppData\Local\Temp\1015775001\60a26bb0cf.exe
                      "C:\Users\Admin\AppData\Local\Temp\1015775001\60a26bb0cf.exe"
                      3⤵
                      • Executes dropped EXE
                      • System Location Discovery: System Language Discovery
                      PID:1508
                      • C:\Windows\system32\cmd.exe
                        cmd /c ""C:\Users\Admin\AppData\Local\Temp\main\main.bat" /S"
                        4⤵
                        • Loads dropped DLL
                        PID:2944
                        • C:\Windows\system32\mode.com
                          mode 65,10
                          5⤵
                            PID:1240
                          • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                            7z.exe e file.zip -p24291711423417250691697322505 -oextracted
                            5⤵
                            • Executes dropped EXE
                            • Loads dropped DLL
                            • Suspicious use of AdjustPrivilegeToken
                            PID:3000
                          • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                            7z.exe e extracted/file_7.zip -oextracted
                            5⤵
                            • Executes dropped EXE
                            • Loads dropped DLL
                            • Suspicious use of AdjustPrivilegeToken
                            PID:292
                          • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                            7z.exe e extracted/file_6.zip -oextracted
                            5⤵
                            • Executes dropped EXE
                            • Loads dropped DLL
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2216
                          • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                            7z.exe e extracted/file_5.zip -oextracted
                            5⤵
                            • Executes dropped EXE
                            • Loads dropped DLL
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2864
                          • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                            7z.exe e extracted/file_4.zip -oextracted
                            5⤵
                            • Executes dropped EXE
                            • Loads dropped DLL
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2180
                          • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                            7z.exe e extracted/file_3.zip -oextracted
                            5⤵
                            • Executes dropped EXE
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1660
                          • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                            7z.exe e extracted/file_2.zip -oextracted
                            5⤵
                            • Executes dropped EXE
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2408
                          • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                            7z.exe e extracted/file_1.zip -oextracted
                            5⤵
                            • Executes dropped EXE
                            • Suspicious use of AdjustPrivilegeToken
                            PID:3020
                          • C:\Windows\system32\attrib.exe
                            attrib +H "in.exe"
                            5⤵
                            • Views/modifies file attributes
                            PID:2152
                          • C:\Users\Admin\AppData\Local\Temp\main\in.exe
                            "in.exe"
                            5⤵
                            • Executes dropped EXE
                            PID:2096
                            • C:\Windows\system32\attrib.exe
                              attrib +H +S C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                              6⤵
                              • Views/modifies file attributes
                              PID:2448
                            • C:\Windows\system32\attrib.exe
                              attrib +H C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                              6⤵
                              • Views/modifies file attributes
                              PID:2788
                            • C:\Windows\system32\schtasks.exe
                              schtasks /f /CREATE /TN "Intel_PTT_EK_Recertification" /TR "C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe" /SC MINUTE
                              6⤵
                              • Scheduled Task/Job: Scheduled Task
                              PID:2884
                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              powershell ping 127.0.0.1; del in.exe
                              6⤵
                              • System Network Configuration Discovery: Internet Connection Discovery
                              • Suspicious use of AdjustPrivilegeToken
                              PID:2576
                              • C:\Windows\system32\PING.EXE
                                "C:\Windows\system32\PING.EXE" 127.0.0.1
                                7⤵
                                • System Network Configuration Discovery: Internet Connection Discovery
                                • Runs ping.exe
                                PID:3384
                      • C:\Users\Admin\AppData\Local\Temp\1015776001\70b999910a.exe
                        "C:\Users\Admin\AppData\Local\Temp\1015776001\70b999910a.exe"
                        3⤵
                        • Executes dropped EXE
                        • Loads dropped DLL
                        • Suspicious use of SetThreadContext
                        • System Location Discovery: System Language Discovery
                        PID:1416
                        • C:\Users\Admin\AppData\Local\Temp\1015776001\70b999910a.exe
                          "C:\Users\Admin\AppData\Local\Temp\1015776001\70b999910a.exe"
                          4⤵
                          • Executes dropped EXE
                          • System Location Discovery: System Language Discovery
                          PID:2028
                      • C:\Users\Admin\AppData\Local\Temp\1015781001\sUSFJjY.exe
                        "C:\Users\Admin\AppData\Local\Temp\1015781001\sUSFJjY.exe"
                        3⤵
                        • Executes dropped EXE
                        PID:2488
                      • C:\Users\Admin\AppData\Local\Temp\1015782001\cc13164a6a.exe
                        "C:\Users\Admin\AppData\Local\Temp\1015782001\cc13164a6a.exe"
                        3⤵
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Executes dropped EXE
                        • Identifies Wine through registry keys
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        PID:1140
                      • C:\Users\Admin\AppData\Local\Temp\1015783001\eb6b10053c.exe
                        "C:\Users\Admin\AppData\Local\Temp\1015783001\eb6b10053c.exe"
                        3⤵
                        • Enumerates VirtualBox registry keys
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Executes dropped EXE
                        • Identifies Wine through registry keys
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        • System Location Discovery: System Language Discovery
                        PID:1816
                      • C:\Users\Admin\AppData\Local\Temp\1015784001\0bcc3dd70d.exe
                        "C:\Users\Admin\AppData\Local\Temp\1015784001\0bcc3dd70d.exe"
                        3⤵
                        • Executes dropped EXE
                        PID:3000
                      • C:\Users\Admin\AppData\Local\Temp\1015785001\eacc350289.exe
                        "C:\Users\Admin\AppData\Local\Temp\1015785001\eacc350289.exe"
                        3⤵
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Executes dropped EXE
                        • Identifies Wine through registry keys
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        • System Location Discovery: System Language Discovery
                        PID:348
                      • C:\Users\Admin\AppData\Local\Temp\1015786001\12da2716b5.exe
                        "C:\Users\Admin\AppData\Local\Temp\1015786001\12da2716b5.exe"
                        3⤵
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Executes dropped EXE
                        • Identifies Wine through registry keys
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        • System Location Discovery: System Language Discovery
                        PID:3236
                      • C:\Users\Admin\AppData\Local\Temp\1015787001\6c57bbbefc.exe
                        "C:\Users\Admin\AppData\Local\Temp\1015787001\6c57bbbefc.exe"
                        3⤵
                          PID:3712
                        • C:\Users\Admin\AppData\Local\Temp\1015788001\31492f7608.exe
                          "C:\Users\Admin\AppData\Local\Temp\1015788001\31492f7608.exe"
                          3⤵
                            PID:3784
                          • C:\Users\Admin\AppData\Local\Temp\1015789001\e1a7e24a01.exe
                            "C:\Users\Admin\AppData\Local\Temp\1015789001\e1a7e24a01.exe"
                            3⤵
                              PID:3156
                        • C:\Windows\system32\conhost.exe
                          \??\C:\Windows\system32\conhost.exe "-472776916393167010-2012927407861361991097509903-1512953772-241577810-1040657476"
                          1⤵
                            PID:3020
                          • C:\Windows\system32\taskeng.exe
                            taskeng.exe {87F618EC-CBF5-45E2-9363-CC277DFA6C99} S-1-5-21-2872745919-2748461613-2989606286-1000:CCJBVTGQ\Admin:Interactive:[1]
                            1⤵
                              PID:3044

                            Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Users\Admin\AppData\Local\Temp\1015564001\ShtrayEasy35.exe

                              Filesize

                              256KB

                              MD5

                              c37a981bc24c4aba6454da4eecb7acbe

                              SHA1

                              2bffdf27d0d4f7c810e323c1671a87ed2d6b644f

                              SHA256

                              d6fc121d54e4cdf3a1b6b0505c4f691f16d91fdd421bf96c04388b1c6f19e361

                              SHA512

                              2f44b5218b323bc2bad3ee37426b5bbcbb089b1a561e5f2f48fd455fed0a395b50a6cbb3783bf06e25b144b3f77078629ab1d86fb2c8df1a532230c81a3b2ab8

                            • C:\Users\Admin\AppData\Local\Temp\1015665001\IQ7ux2z.exe

                              Filesize

                              2.8MB

                              MD5

                              0dad190f420a0a09ed8c262ca18b1097

                              SHA1

                              b97535bf2960278b19bda8cad9e885b8eefbdc85

                              SHA256

                              29e1e95110c03e84720e213a2bb0dcdff95af85a8a894d71518e06c62131e64a

                              SHA512

                              8ae92676fc5539899414f0a70cba1ed01685b30af9002c68114720d6a7213e4e9c2368e17717c4e3e02650781a022001e4a2e43f83afbd709e7f1ab81003b646

                            • C:\Users\Admin\AppData\Local\Temp\1015775001\60a26bb0cf.exe

                              Filesize

                              4.2MB

                              MD5

                              3a425626cbd40345f5b8dddd6b2b9efa

                              SHA1

                              7b50e108e293e54c15dce816552356f424eea97a

                              SHA256

                              ba9212d2d5cd6df5eb7933fb37c1b72a648974c1730bf5c32439987558f8e8b1

                              SHA512

                              a7538c6b7e17c35f053721308b8d6dc53a90e79930ff4ed5cffecaa97f4d0fbc5f9e8b59f1383d8f0699c8d4f1331f226af71d40325022d10b885606a72fe668

                            • C:\Users\Admin\AppData\Local\Temp\1015776001\70b999910a.exe

                              Filesize

                              710KB

                              MD5

                              28e568616a7b792cac1726deb77d9039

                              SHA1

                              39890a418fb391b823ed5084533e2e24dff021e1

                              SHA256

                              9597798f7789adc29fbe97707b1bd8ca913c4d5861b0ad4fdd6b913af7c7a8e2

                              SHA512

                              85048799e6d2756f1d6af77f34e6a1f454c48f2f43042927845931b7ecff2e5de45f864627a3d4aa061252401225bbb6c2caa8532320ccbe401e97c9c79ac8e5

                            • C:\Users\Admin\AppData\Local\Temp\1015781001\sUSFJjY.exe

                              Filesize

                              87KB

                              MD5

                              65ca33d1c759d3d8eb1d015d26479271

                              SHA1

                              2b0992769c879e7e22f9e3a18f3d1fb15e0870aa

                              SHA256

                              69bdb80ed6cbffe24e06d5bccea27aa1f6fbca4540e2bc191c85f7a2e91400ea

                              SHA512

                              d18f975b4e1d387f88ef1e490ac6456ff19c8138bcde522ccf3302fe6d2199ccfc99ab894ad968af8c76ca412caf9d2b069f6444960c26a057cddb44449be2e9

                            • C:\Users\Admin\AppData\Local\Temp\1015782001\cc13164a6a.exe

                              Filesize

                              4.3MB

                              MD5

                              ea9d4cdd2c3a08334a9bfca3cc42c9d3

                              SHA1

                              967238207fb0da446d69fb49c100bea5bb11c618

                              SHA256

                              09febedf5fe3b7498edd06359882ccb3b05d55a4e56cb6133960fe1723838845

                              SHA512

                              d415b953eaaa3b2a78405489fc025c59afd24117d8af7943fd0fb0903dcb460f200f6ff95a08d1224cf622f6f66105eae6336ef9bc263a6af312a4f1e781216d

                            • C:\Users\Admin\AppData\Local\Temp\1015783001\eb6b10053c.exe

                              Filesize

                              4.2MB

                              MD5

                              6a94a20c20e2a75fa16041e1175793e7

                              SHA1

                              40d8df3d0bdfef2eaccb7b14d62f78c9eff5c989

                              SHA256

                              102d2c6aa1e5b2a0d91df5f7dcdf0c8a0393595578ecb714669ef85e1319104d

                              SHA512

                              24250549fc70ffcbccb64eb5a1634005084bdfdccaeff892b6460ef10837d622bcbc817983c922516324b868c935f7d6277b8d919f2abeaf41b4156f948997c1

                            • C:\Users\Admin\AppData\Local\Temp\1015784001\0bcc3dd70d.exe

                              Filesize

                              384KB

                              MD5

                              dfd5f78a711fa92337010ecc028470b4

                              SHA1

                              1a389091178f2be8ce486cd860de16263f8e902e

                              SHA256

                              da96f2eb74e60de791961ef3800c36a5e12202fe97ae5d2fcfc1fe404bc13c0d

                              SHA512

                              a3673074919039a2dc854b0f91d1e1a69724056594e33559741f53594e0f6e61e3d99ec664d541b17f09ffdebc2de1b042eec19ca8477fac86359c703f8c9656

                            • C:\Users\Admin\AppData\Local\Temp\1015785001\eacc350289.exe

                              Filesize

                              1.7MB

                              MD5

                              6c1d0dabe1ec5e928f27b3223f25c26b

                              SHA1

                              e25ab704a6e9b3e4c30a6c1f7043598a13856ad9

                              SHA256

                              92228a0012605351cf08df9a2ad4b93fa552d7a75991f81fb80f1ae854a0e57d

                              SHA512

                              3a3f7af4f6018fcbd8c6f2871270504731cf269134453c9a146351c3e4a5c89165ecccafb3655d8b39c1ff1ec68f06e1851c0abd66d47602e1f0f8e36d4acfe9

                            • C:\Users\Admin\AppData\Local\Temp\1015786001\12da2716b5.exe

                              Filesize

                              1.8MB

                              MD5

                              1d13d83ba0b9e54307060da3ad2c16bf

                              SHA1

                              45fe957170c36b1704c25ff65d59dd8bbe6894cd

                              SHA256

                              cce6c6f51a01ff3662b263cd464e41b163db9590453603e2c8b5dee39d5f94d0

                              SHA512

                              803e1b9587fc7aab36c96d52fe901fa6dbe0523aa46da23afb0bd50f7ebcbe5bfd9793ac61cbdd4d228159786d240d5161ff80a5e445eaa00fc77cdf455eb526

                            • C:\Users\Admin\AppData\Local\Temp\1015787001\6c57bbbefc.exe

                              Filesize

                              1.7MB

                              MD5

                              228bc900c337f34da99576e917296e62

                              SHA1

                              0f6393c99373b170166bf3e563d3380914d8afe3

                              SHA256

                              9b4a6a847a0e8ea430a26136519ab7bf301f6b6c3a162d8443300d5e6f50cb86

                              SHA512

                              7c5a8bd94c9cca5267aafd0284573843e77d8cb9294131396a6b434af8d8e489ca33374d718fc45edb7e412c0f8d6832f8a936374a4f6612f2e9395377cd4382

                            • C:\Users\Admin\AppData\Local\Temp\1015788001\31492f7608.exe

                              Filesize

                              950KB

                              MD5

                              a0b7a28c8ae27509d5fdfe9e6582705c

                              SHA1

                              3bcf1aa52032034e3a4968fd2633cabd3b2c2e08

                              SHA256

                              696495731d4eb0f28bc4678f8ea8c20a9c1caf16a460405fea538893a792fd05

                              SHA512

                              f197738e61660e4497bd1cc3f3c1b70ebfc403948208cb570b292d3fba78d0ca27487b4784f6680bf219678e861d5b489bc2858f5d99f349c65b6e568dc3c63f

                            • C:\Users\Admin\AppData\Local\Temp\1015789001\e1a7e24a01.exe

                              Filesize

                              2.6MB

                              MD5

                              1e79d4fce2c654ed8d56747616ec0746

                              SHA1

                              73d8717f19ac08c494ef7a533dbdec599c9a644d

                              SHA256

                              29425b85ecbb9a2009dfe1f482d1a29d65d991eec1f69f7386c782bbc54980d0

                              SHA512

                              bc44178b2ae8f8d185f800bd05247080bbd9b7f4c7da587f0c9d2e205358d47e57cb5b4fc03b08f17115bf89fa33cbff5d137f8b82230d4d694f16016cec4ce5

                            • C:\Users\Admin\AppData\Local\Temp\main\7z.exe

                              Filesize

                              458KB

                              MD5

                              619f7135621b50fd1900ff24aade1524

                              SHA1

                              6c7ea8bbd435163ae3945cbef30ef6b9872a4591

                              SHA256

                              344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

                              SHA512

                              2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

                            • C:\Users\Admin\AppData\Local\Temp\main\main.bat

                              Filesize

                              440B

                              MD5

                              3626532127e3066df98e34c3d56a1869

                              SHA1

                              5fa7102f02615afde4efd4ed091744e842c63f78

                              SHA256

                              2a0e18ef585db0802269b8c1ddccb95ce4c0bac747e207ee6131dee989788bca

                              SHA512

                              dcce66d6e24d5a4a352874144871cd73c327e04c1b50764399457d8d70a9515f5bc0a650232763bf34d4830bab70ee4539646e7625cfe5336a870e311043b2bd

                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\GoogleChrome.lnk

                              Filesize

                              1KB

                              MD5

                              62cad385e3722737b664d1a6ec04e477

                              SHA1

                              87391a4a6848a1cb74c896121cd2e8df3b6da694

                              SHA256

                              8167700fa312e96772e7fc9693b7f025ac4a9b852b144e6f4aac45fcccc68ae1

                              SHA512

                              1aeb7e3a25555297bbd13e0caf25ed65aa7302c9b0f6831e34ddcb0c2f559be8985086f058fd4f2d926883ce60dbb3863932e42cba81bf1f08d03fd62eab9f64

                            • \Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

                              Filesize

                              2.9MB

                              MD5

                              f45da90410f7d099ab3bd1589a039a79

                              SHA1

                              a7effa8c1fc9b88eea3498ed50011d7a14a7e617

                              SHA256

                              4fb84272045fc39952401061f10a2ba439d2f2a7c6e30f2448b757caf731df19

                              SHA512

                              577ae3d2c9f46c57ba71a9437fdf47deac865605b31f0a0a2a2caef90a4346bfa12c0894fe9c3a8dc7a602516bde33d58d483a8c5547452397f15a824c07a864

                            • memory/348-513-0x0000000000100000-0x000000000058B000-memory.dmp

                              Filesize

                              4.5MB

                            • memory/348-451-0x0000000000100000-0x000000000058B000-memory.dmp

                              Filesize

                              4.5MB

                            • memory/1140-438-0x0000000001300000-0x0000000001EFC000-memory.dmp

                              Filesize

                              12.0MB

                            • memory/1140-441-0x0000000001300000-0x0000000001EFC000-memory.dmp

                              Filesize

                              12.0MB

                            • memory/1140-450-0x0000000001300000-0x0000000001EFC000-memory.dmp

                              Filesize

                              12.0MB

                            • memory/1140-376-0x0000000001300000-0x0000000001EFC000-memory.dmp

                              Filesize

                              12.0MB

                            • memory/1140-352-0x0000000001300000-0x0000000001EFC000-memory.dmp

                              Filesize

                              12.0MB

                            • memory/1816-398-0x0000000001180000-0x0000000001DB8000-memory.dmp

                              Filesize

                              12.2MB

                            • memory/1816-489-0x0000000001180000-0x0000000001DB8000-memory.dmp

                              Filesize

                              12.2MB

                            • memory/1816-550-0x0000000001180000-0x0000000001DB8000-memory.dmp

                              Filesize

                              12.2MB

                            • memory/2028-325-0x0000000000400000-0x0000000000457000-memory.dmp

                              Filesize

                              348KB

                            • memory/2028-324-0x0000000000400000-0x0000000000457000-memory.dmp

                              Filesize

                              348KB

                            • memory/2028-323-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

                              Filesize

                              4KB

                            • memory/2028-321-0x0000000000400000-0x0000000000457000-memory.dmp

                              Filesize

                              348KB

                            • memory/2028-319-0x0000000000400000-0x0000000000457000-memory.dmp

                              Filesize

                              348KB

                            • memory/2028-317-0x0000000000400000-0x0000000000457000-memory.dmp

                              Filesize

                              348KB

                            • memory/2028-315-0x0000000000400000-0x0000000000457000-memory.dmp

                              Filesize

                              348KB

                            • memory/2028-313-0x0000000000400000-0x0000000000457000-memory.dmp

                              Filesize

                              348KB

                            • memory/2028-311-0x0000000000400000-0x0000000000457000-memory.dmp

                              Filesize

                              348KB

                            • memory/2096-449-0x000000013FAE0000-0x000000013FF70000-memory.dmp

                              Filesize

                              4.6MB

                            • memory/2480-583-0x0000000005070000-0x0000000005228000-memory.dmp

                              Filesize

                              1.7MB

                            • memory/2480-581-0x0000000005070000-0x0000000005228000-memory.dmp

                              Filesize

                              1.7MB

                            • memory/2480-573-0x0000000005070000-0x0000000005228000-memory.dmp

                              Filesize

                              1.7MB

                            • memory/2480-569-0x0000000005070000-0x0000000005228000-memory.dmp

                              Filesize

                              1.7MB

                            • memory/2480-567-0x0000000005070000-0x0000000005228000-memory.dmp

                              Filesize

                              1.7MB

                            • memory/2480-575-0x0000000005070000-0x0000000005228000-memory.dmp

                              Filesize

                              1.7MB

                            • memory/2480-589-0x0000000005070000-0x0000000005228000-memory.dmp

                              Filesize

                              1.7MB

                            • memory/2480-577-0x0000000005070000-0x0000000005228000-memory.dmp

                              Filesize

                              1.7MB

                            • memory/2480-566-0x0000000005070000-0x0000000005228000-memory.dmp

                              Filesize

                              1.7MB

                            • memory/2480-579-0x0000000005070000-0x0000000005228000-memory.dmp

                              Filesize

                              1.7MB

                            • memory/2480-180-0x0000000000BD0000-0x0000000000EAC000-memory.dmp

                              Filesize

                              2.9MB

                            • memory/2480-591-0x0000000005070000-0x0000000005228000-memory.dmp

                              Filesize

                              1.7MB

                            • memory/2480-565-0x0000000005070000-0x000000000522E000-memory.dmp

                              Filesize

                              1.7MB

                            • memory/2480-571-0x0000000005070000-0x0000000005228000-memory.dmp

                              Filesize

                              1.7MB

                            • memory/2480-585-0x0000000005070000-0x0000000005228000-memory.dmp

                              Filesize

                              1.7MB

                            • memory/2480-587-0x0000000005070000-0x0000000005228000-memory.dmp

                              Filesize

                              1.7MB

                            • memory/2480-595-0x0000000005070000-0x0000000005228000-memory.dmp

                              Filesize

                              1.7MB

                            • memory/2480-593-0x0000000005070000-0x0000000005228000-memory.dmp

                              Filesize

                              1.7MB

                            • memory/2488-551-0x0000000000370000-0x0000000000376000-memory.dmp

                              Filesize

                              24KB

                            • memory/2488-276-0x00000000001C0000-0x00000000001D8000-memory.dmp

                              Filesize

                              96KB

                            • memory/2520-0-0x00000000002D0000-0x00000000005F3000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/2520-18-0x00000000002D0000-0x00000000005F3000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/2520-5-0x00000000002D0000-0x00000000005F3000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/2520-3-0x00000000002D0000-0x00000000005F3000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/2520-2-0x00000000002D1000-0x00000000002FF000-memory.dmp

                              Filesize

                              184KB

                            • memory/2520-1-0x0000000076F00000-0x0000000076F02000-memory.dmp

                              Filesize

                              8KB

                            • memory/2576-472-0x00000000004C0000-0x00000000004C8000-memory.dmp

                              Filesize

                              32KB

                            • memory/2576-471-0x000000001B6B0000-0x000000001B992000-memory.dmp

                              Filesize

                              2.9MB

                            • memory/2704-411-0x00000000069F0000-0x00000000075EC000-memory.dmp

                              Filesize

                              12.0MB

                            • memory/2704-422-0x00000000010A0000-0x00000000013C3000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/2704-495-0x00000000010A0000-0x00000000013C3000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/2704-463-0x00000000069F0000-0x0000000006E7B000-memory.dmp

                              Filesize

                              4.5MB

                            • memory/2704-19-0x00000000010A0000-0x00000000013C3000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/2704-464-0x00000000010A0000-0x00000000013C3000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/2704-20-0x00000000010A1000-0x00000000010CF000-memory.dmp

                              Filesize

                              184KB

                            • memory/2704-21-0x00000000010A0000-0x00000000013C3000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/2704-523-0x00000000069F0000-0x0000000006E7B000-memory.dmp

                              Filesize

                              4.5MB

                            • memory/2704-526-0x00000000010A0000-0x00000000013C3000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/2704-23-0x00000000010A0000-0x00000000013C3000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/2704-454-0x00000000069F0000-0x0000000006E7B000-memory.dmp

                              Filesize

                              4.5MB

                            • memory/2704-548-0x00000000010A0000-0x00000000013C3000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/2704-425-0x00000000069F0000-0x00000000075EC000-memory.dmp

                              Filesize

                              12.0MB

                            • memory/2704-562-0x00000000010A0000-0x00000000013C3000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/2704-25-0x00000000010A0000-0x00000000013C3000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/2704-163-0x00000000010A0000-0x00000000013C3000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/2704-474-0x00000000069F0000-0x0000000007628000-memory.dmp

                              Filesize

                              12.2MB

                            • memory/2704-388-0x00000000069F0000-0x0000000007628000-memory.dmp

                              Filesize

                              12.2MB

                            • memory/2704-365-0x00000000010A0000-0x00000000013C3000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/2704-350-0x00000000069F0000-0x00000000075EC000-memory.dmp

                              Filesize

                              12.0MB

                            • memory/2704-351-0x00000000069F0000-0x00000000075EC000-memory.dmp

                              Filesize

                              12.0MB

                            • memory/2704-326-0x00000000010A0000-0x00000000013C3000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/2704-292-0x00000000010A0000-0x00000000013C3000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/2704-259-0x00000000010A0000-0x00000000013C3000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/2704-232-0x00000000010A0000-0x00000000013C3000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/2704-164-0x00000000010A0000-0x00000000013C3000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/2704-165-0x00000000010A0000-0x00000000013C3000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/2944-453-0x000000013FAE0000-0x000000013FF70000-memory.dmp

                              Filesize

                              4.6MB

                            • memory/2944-452-0x000000013FAE0000-0x000000013FF70000-memory.dmp

                              Filesize

                              4.6MB

                            • memory/2944-514-0x000000013FAE0000-0x000000013FF70000-memory.dmp

                              Filesize

                              4.6MB

                            • memory/2944-515-0x000000013FAE0000-0x000000013FF70000-memory.dmp

                              Filesize

                              4.6MB

                            • memory/3156-563-0x0000000000E90000-0x000000000113C000-memory.dmp

                              Filesize

                              2.7MB

                            • memory/3156-564-0x0000000000E90000-0x000000000113C000-memory.dmp

                              Filesize

                              2.7MB